登录 | 注册 | 充值 | 退出 | 公司首页 | 繁体中文 | 满意度调查
综合馆
标准模型下可证安全的基于身份的高效签名方案
参考文献
  • [1] 冯登国. 可证明安全性理论与方法研究. 软件学报, 2005,10
  • [2] 王圣宝,曹珍富,董晓蕾. 标准模型下可证安全的身份基认证密钥协商协议. 计算机学报, 2007,10
  • [3] 李进,张方国,王燕鸣. 两个高效的基于分级身份的签名方案. 电子学报, 2007,1
  • [4] Bellare M;Boldyreva A;Palacio A. A uninstantiable random oracle-model scheme for a hybrid-encryption problem. Springer-Verlag, 2004
  • [5] Boneh D;Boyen X. Efficient selective-ID secure identitybased encryption without random oracles. Springer-Verlag, 2004
  • [6] Boneh D;Boyen X. Secure identity based encryption without random oracles. Springer-Verlag, 2004
  • [7] Waters B. Efficient identity-based encryption without random oracles. Springer-Verlag, 2005
  • [8] Paterson K G;Schuldt J C N. Efficient identity-based signatures secure in the standard model. Springer-Verlag, 2006
  • [9] Boneh D;Franklin M. Identity-based encryption from the Weil pairing. Springer-Verlag, 2001
  • [10] Goldwasser S;Micali S;Rivest R L. A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal on Computing, 1988,02
  • [11] Boneh D;Boyen X. Short signatures without random oracles. Springer-Verlag, 2004
  • [12] Chatterjee S;Sarkar P. Trading time for space:Towards an efficient IBE scheme with short(er) public parameters in the standard model. Springer-Verlag, 2006
  • [13] Li J G;Huang X Y;Mu Y;Susilo W,Wu Q H. Certificatebased signature:Security model and efficient construction. Springer-Verlag, 2007
  • [14] Kang B G;Park J H;Hahn S G. A certificate-based signature scheme. Springer-Verlag, 2004
  • [15] Wang L H;Shao J;Cao Z F;Mambo M,Yamamura A. A certificate-based proxy cryptosystem with revocable proxy decryption power. Springer-Verlag, 2007
  • [16] Shamir A. Identity-based cryptosystems and signature schemes. Santa Barbara,California, 1984
  • [17] Bellare M;Rogoway P. Random oracles are practical:A paradigm for designing efficient protocols. ACM, 1993
  • [18] Canetti R;Goldreich O;Halevi S. The random oracle methodology,Revisited (preliminary version). New York:ACM, 1998
  • [19] Li J G;Huang X Y;Mu Y;Wu W. Cryptanalysis and improvement of an efficient certificateless signature scheme. JOURNAL OF COMMUNICATIONS AND NETWORKS, 2008,01
  • [20] Paterson K G. ID-based signatures from pairings on elliptic curves.[Cryptology ePrint Archive,Report 2002/003]. 2002
  • [21] Chen X;Zhang F;Kim K. A new ID-based group signature scheme from bilinear pairings. Springer-Verlag, 2003
  • [22] Hess F. Efficient identity based signature schemes based on pairings. Springer-Verlag, 2003
  • [23] Cha J C;Cheon J H. An identity-based signature from gap Diffie-Hellman groups. Springer-Verlag, 2003
  • [24] Yi X. An identity-based signature scheme from the Weil pairing. IEEE Communications Letters, 2003,02
  • [25] Yoon H;Cheon J H;Kim Y. Batch verifications with ID-based signatures. Springer-Verlag, 2005
  • [26] Lu Y;Li J G;Xiao J M. Constructing efficient certificatebased eneryption with paring. Journal of Computers, 2009,01
  • [27] Naccache D. Secure and practical identity-based encryption.[Cryptology ePrint Archive,Report 2005/369]. http://eprint.iacr.org/, 2005
  • [28] Sakai R;Ohgishi K;Kasahara M. Cryptosystems based on pairing. 2000
查看更多︾
相似文献 查看更多>>
54.198.246.164